Continuous mobile authentication using a novel Graphic Touch Gesture Feature
暂无分享,去创建一个
[1] Ioannis A. Kakadiaris,et al. Illumination Normalization Using Self-lighting Ratios for 3D2D Face Recognition , 2012, ECCV Workshops.
[2] Dawn Xiaodong Song,et al. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.
[3] Heinrich Hußmann,et al. Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.
[4] Youtian Du,et al. User Authentication Through Mouse Dynamics , 2013, IEEE Transactions on Information Forensics and Security.
[5] Yang Li,et al. Experimental analysis of touch-screen gesture designs in mobile environments , 2011, CHI.
[6] Alex ChiChung Kot,et al. Fingerprint Combination for Privacy Protection , 2013, IEEE Transactions on Information Forensics and Security.
[7] Zhihong Zeng,et al. A Survey of Affect Recognition Methods: Audio, Visual, and Spontaneous Expressions , 2009, IEEE Trans. Pattern Anal. Mach. Intell..
[8] Nasir D. Memon,et al. Investigating multi-touch gestures as a novel biometric modality , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[9] DAVID ZHANG,et al. A Comparative Study of Palmprint Recognition Algorithms , 2012, CSUR.
[10] Adam J. Aviv,et al. Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.
[11] Sahin Albayrak,et al. A generic framework and runtime environment for development and evaluation of behavioral biometrics solutions , 2010, 2010 10th International Conference on Intelligent Systems Design and Applications.
[12] Berrin A. Yanikoglu,et al. Biometric Authentication Using Online Signatures , 2004, ISCIS.
[13] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[14] Jun Yang,et al. SenGuard: Passive user identification on smartphones using multiple sensors , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[15] John H. L. Hansen,et al. A Study on Universal Background Model Training in Speaker Verification , 2011, IEEE Transactions on Audio, Speech, and Language Processing.
[16] Kyungroul Lee,et al. Keyboard Security: A Technological Review , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[17] Jiri Matas,et al. On Combining Classifiers , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[18] Marcos Faúndez-Zanuy,et al. On-line signature recognition based on VQ-DTW , 2007, Pattern Recognit..